Categories Pricing Corporate

IT Management

Using and Managing Passwords
Programmed Learning
LGPD Compliance Support Tools
Micro Talk: HR - Privacy and Protection, Part 1
Expert Talk: Adjusting your Tech Mindset
Building Real Time Web Applications in PHP and JS
Assessing Information Risks
Expert Talk: Technology and Change
Information security for non-technical managers
Windows 7 Install to Secure
IT Strategy & Technology Innovation
Hands-on with SAP ERP and IDES
Cloud Computing
Data Protection Impact Assessment
Data Protection Specialized Controls
Enhance a Website Project
GDPR Gap Assessment Tools
GDPR Gap Analysis by Article
IT Best Practices: Purchasing a New Computer
Common Types of Attack
IT-Business Alignment: Part I
How to Improve Your Production: Part II
How to improve your company’s performance
Data Protection and Privacy Management System
Expert Talk: Data and Technology
DP&P Strategies, Policies and Plans
Hands-on with SAP S/4HANA and GBI
Expert Talk: Responsible Use of AI
Practical IT Asset Management
The adventures of an IT leader
IT Management
CCNA in 21 Hours
How to Talk Tech to a Non-Techie Audience
IT Management, Part II
Expert Talk: Cyber Security
IT Management Controls
An Insider’s Guide: Website Sourcing Made Easy!
Agile Leadership
GDPR Gap Analysis by Process
The complete web developer
Managerial Technology Evaluation
Introduction to Malware
Productivity: Email Hacks
Managing Data Subject Rights
Introduction to Social Engineering
Agile for Managers
Expert Talk: What is Blockchain
The modern information environment
Salesforce Document Generation and Why You Need It
Managing Personal Data Breaches
Expert Talk: Data Security Protection & Management
Making the Most of Big Data
Good Digital Hygiene
Linux for system administrators and DevOps
OOP in PHP and MVC
An Introduction to the Internet of Things
Agile Concepts
Expert Talk: Adapting to Tech Changes
Expert Talk: AI in Business - the Real Scoop
Scrum: The Basics
IT-Business Alignment: Part II
Security and Data Privacy Audit Questionnaires
Effective Personal Data Practices
Cyberattacks and Cybersecurity
How to Improve Your Production: Part I